Volume 177,
Number 1,
January 2007
Zdzislaw Pawlak life and work (1926-2006)
Regular papers
- Pawel Terlecki, Krzysztof Walczak:
On the relation between rough set reducts and jumping emerging patterns.
74-83
- Jerry M. Mendel:
Advances in type-2 fuzzy sets and systems.
84-110
- Fabrizio Durante, Radko Mesiar, Pier Luigi Papini, Carlo Sempi:
2-Increasing binary aggregation operators.
111-129
- Corrado Mencar, Giovanna Castellano, Anna Maria Fanelli:
Distinguishability quantification of fuzzy sets.
130-149
- Mustafa Demirci, Zeynep Eken:
An introduction to vague complemented ordered sets.
150-160
- Vladimír Janis, Branimir Seselja, Andreja Tepavcevic:
Non-standard cut classification of fuzzy sets.
161-169
- Stuart Harvey Rubin:
On randomization and discovery.
170-191
- Shuhai Li, Yumin Wang:
Exploiting randomness on continuous sets.
192-201
- Stephen Drape:
Generalising the array split obfuscation.
202-219
- Karel De Loof, Bernard De Baets, Hans De Meyer:
On the random generation and counting of weak order extensions of a poset with given class cardinalities.
220-230
- Alessandro Bogliolo, Valerio Freschi:
Parallel comparison of run-length-encoded strings on a linear systolic array.
231-238
- Michel Neuhaus, Horst Bunke:
Automatic learning of cost functions for graph edit distance.
239-247
- Zeshui Xu, Jian Chen:
An interactive method for fuzzy multiple attribute group decision making.
248-263
- Chi-Yung Lee, Cheng-Jian Lin, Huei-Jen Chen:
A self-constructing fuzzy CMAC model and its applications.
264-280
- Huiping Guo, Yingjiu Li, Sushil Jajodia:
Chaining watermarks for detecting malicious modifications to streaming data.
281-298
- Nicoletta De Francesco, Antonella Santone, Gigliola Vaglini:
A user-friendly interface to specify temporal properties of concurrent systems.
299-311
- Hongbin Dong, Jun He, Houkuan Huang, Wei Hou:
Evolutionary programming using a mixed mutation strategy.
312-327
Volume 177,
Number 2,
January 2007
Special issue:
on Advances in Fuzzy Logic
- Abraham Kandel, Mark Last:
Special issue on advances in fuzzy logic.
329-331
- I. Burhan Türksen:
Meta-linguistic axioms as a foundation for computing with words.
332-359
- Jerry M. Mendel, Hongwei Wu:
New results about the centroid of an interval type-2 fuzzy set, including the centroid of a fuzzy granule.
360-377
- Anca L. Ralescu, Dan A. Ralescu, Yoko Yamakata:
Inference by aggregation of evidence with applications to fuzzy probabilities.
378-387
- Vladik Kreinovich, Jan Beck, Hung T. Nguyen:
Ellipsoids and ellipsoid-shaped fuzzy sets as natural multi-variate generalization of intervals and fuzzy numbers: How to elicit them from users, and how to use them in data processing.
388-407
- Scott Dick, Adam Schenker, Witold Pedrycz, Abraham Kandel:
Regranulation: A granular algorithm enabling communication between granular worlds.
408-435
- Leonard J. Jowers, James J. Buckley, Kevin D. Reilly:
Simulating continuous fuzzy systems.
436-448
- Özge Uncu, I. Burhan Türksen:
A novel feature selection approach: Combining feature wrappers and filters.
449-466
- Menahem Friedman, Mark Last, Yaniv Makover, Abraham Kandel:
Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology.
467-475
- Bo Jin, Y. C. Tang, Yan-Qing Zhang:
Support vector machines with genetic fuzzy feature transformation for biomedical data classification.
476-489
Regular papers
- Sheng Zhong:
Privacy-preserving algorithms for distributed mining of frequent itemsets.
490-503
- Zhanfeng Shen, Jiancheng Luo, Guangyu Huang, Dongping Ming, Weifeng Ma, Hao Sheng:
Distributed computing model for processing remotely sensed images based on grid computing.
504-518
- Sun-Yuan Hsieh:
The interval-merging problem.
519-524
- Yon Dohn Chung:
An indexing scheme for energy-efficient processing of content-based retrieval queries on a wireless data stream.
525-542
- Chien-Lung Hsu, Kuo-Yu Tsai, Pei-Ling Tsai:
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
543-549
- Hung-Hsu Tsai, Duen-Wu Sun:
Color image watermark extraction based on support vector machines.
550-569
- Ruey-Shun Chen, Chin-Hsiao Hsiang:
A study on the critical success factors for corporations embarking on knowledge community-based e-learning.
570-586
- Vijay K. Vaishnavi, Sandeep Purao, Jens Liegle:
Object-oriented product metrics: A generic framework.
587-606
- Songtao Jiang, Byung Suk Lee, Zhen He:
Cost modeling of spatial operators using non-parametric regression.
607-631
- Kazi Shah Nawaz Ripon, Sam Kwong, K. F. Man:
A real-coding jumping gene genetic algorithm (RJGGA) for multiobjective optimization.
632-654
Addendum
- Salih Aytar, Serpil Pehlivan:
Addendum to "Statistically monotonic and statistically bounded sequences of fuzzy numbers" [Informat Sci 176: (2006) 734-744].
655-656
Volume 177,
Number 3,
February 2007
- Young-Guk Ha, Joo-Chan Sohn, Young-Jo Cho, Hyunsoo Yoon:
A robotic service framework supporting automated integration of ubiquitous sensors and devices.
657-679
- Dennis Fuchs, Zhen He, Byung Suk Lee:
Compressed histograms with arbitrary bucket layouts for selectivity estimation.
680-702
- Yaochun Huang, Hui Xiong, Weili Wu, Ping Deng, Zhongnan Zhang:
Mining maximal hyperclique pattern: A hybrid search strategy.
703-721
- Yongsheng Ding, Lei Gao, Da Ruan:
Communication mechanisms in ecological network-based grid middleware for service emergence.
722-733
- Shu-Chuan Chu, Zhe-Ming Lu, Jeng-Shyang Pan:
Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding.
734-746
- Chih-Hung Wang, Chih-Yu Liu:
A new ring signature scheme with signer-admission property.
747-754
- Ulas Beldek, Kemal Leblebicioglu:
Strategy creation, decomposition and distribution in particle navigation.
755-770
- Waranyu Wongseree, Nachol Chaiyaratana, Kanjana Vichittumaros, Pranee Winichagoon, Suthat Fucharoen:
Thalassaemia classification by neural networks and genetic programming.
771-786
- Ismail H. Toroslu, Yilmaz Arslanoglu:
Genetic algorithm for the personnel assignment problem with multiple objectives.
787-803
- Ho-Youl Jung, Yun-Ju Park, Young-Jin Kim, Jung-Sun Park, Kuchan Kimm, InSong Koh:
New methods for imputation of missing genotype using linkage disequilibrium and haplotype information.
804-814
- W. David Pan, Seong-Moo Yoo, Mahesh Nalasani, Paul G. Cox:
Efficient local transformation estimation using Lie operators.
815-831
- SangYoon Lee, Sanghyun Park, Woo-Cheol Kim, Dongwon Lee:
An efficient location encoding method for moving objects using hierarchical administrative district and road network.
832-843
- V. Lakshmi Narasimhan, B. Hendradjaya:
Some theoretical considerations for a suite of metrics for the integration of software components.
844-864
- Bijan Davvaz, P. Corsini:
Redefined fuzzy Hv-submodules and many valued implications.
865-875
- Jianming Zhan, Wieslaw A. Dudek:
Fuzzy h-ideals of hemirings.
876-886
- Zhudeng Wang:
TL-filters of integral residuated l-monoids.
887-896
- Hee Sik Kim, B. Monk, J. Neggers:
On pseudo-fuzzy linear mappings.
897-905
- Humberto Bustince Sola, Miguel Pagola, Edurne Barrenechea Tartas:
Construction of fuzzy indices from fuzzy DI-subsethood measures: Application to the global comparison of images.
906-929
- J. Balasubramaniam:
Yager's new class of implications Jf and some classical tautologies.
930-946
- M. Masoom Ali, Saralees Nadarajah:
Information matrices for normal and Laplace mixtures.
947-955
- Hua-Wen Liu, Guo-Jun Wang:
Unified forms of fully implicational restriction methods for fuzzy reasoning.
956-966
- Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y. W. Chang, Irving S. Reed:
Erratum to "Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8 leq m leq 10" [Informat Sci 176 (1) (2006) 1-26].
967-968
Volume 177,
Number 4,
February 2007
- Marion G. Ceruti, Stuart Harvey Rubin:
Infodynamics: Analogical analysis of states of matter and information.
969-987
- Jerry M. Mendel:
Computing with words and its relationships with fuzzistics.
988-1006
- Xiaodong Liu, Tianyou Chai, Wei Wang, Wanquan Liu:
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory I.
1007-1026
- Xiaodong Liu, Wei Wang, Tianyou Chai, Wanquan Liu:
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory II.
1027-1045
- Jun Ma, Wenjiang Li, Da Ruan, Yang Xu:
Filter-based resolution principle for lattice-valued propositional logic LP(X).
1046-1062
- Huan Huang, Congxin Wu:
On the triangle inequalities in fuzzy metric spaces.
1063-1072
- Tzu-Chao Lin:
A new adaptive center weighted median filter for suppressing impulsive noise in images.
1073-1087
- Ling Shao, Timor Kadir, Michael Brady:
Geometric and photometric invariant distinctive regions detection.
1088-1122
- Yu Wang, Marc Q. Ma, Kai Zhang, Frank Y. Shih:
A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing.
1123-1135
- Di Xiao, Xiaofeng Liao, Shaojiang Deng:
A novel key agreement protocol based on chaotic maps.
1136-1142
- Kyung-Ah Shim, Sung Sik Woo:
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols.
1143-1151
Volume 177,
Number 5,
March 2007
Including:
The 3rd International Workshop on Computational Intelligence in Economics and Finance (CIEF'2003)
- Shu-Heng Chen:
Computationally intelligent agents in economics and finance.
1153-1168
- Raquel Flórez López:
Strategic supplier selection in the added-value perspective: A CI approach.
1169-1179
- Zhineng Zhu, Haibo He, Janusz A. Starzyk, C. Tseng:
Self-organizing learning array and its application to economic and financial problems.
1180-1192
- Ping-Chen Lin, Jiah-Shing Chen:
FuzzyTree crossover for multi-valued stock valuation.
1193-1203
- Domenico Delli Gatti, Edoardo Gaffeo, Mauro Gallegati, Gianfranco Giulioni, Alan Kirman, Antonio Palestrini, Alberto Russo:
Complex dynamics and empirical evidence.
1204-1221
- Shu-Heng Chen, Ya-Chi Huang:
Relative risk aversion and wealth dynamics.
1222-1229
Regular papers
- Ying-Ming Wang, Jian-Bo Yang, Dong-Ling Xu, Kwai-Sang Chin:
On the combination and normalization of interval-valued belief structures.
1230-1247
- Ismail Ellabib, Paul H. Calamai, Otman A. Basir:
Exchange strategies for multiple Ant Colony System.
1248-1264
- Qiu-Hua Lin, Yong-Rui Zheng, Fuliang Yin, Hualou Liang, Vince D. Calhoun:
A fast algorithm for one-unit ICA-R.
1265-1275
- Ester Yen, I-Wen Mike Chu:
Relaxing instance boundaries for the search of splitting points of numerical attributes in classification trees.
1276-1289
- Prodip Bhowal, Dipankar Sarkar, Siddhartha Mukhopadhyay, Anupam Basu:
Fault diagnosis in discrete time hybrid systems - A case study.
1290-1308
- Ali Saman Tosun:
Threshold-based declustering.
1309-1331
Volume 177,
Number 6,
March 2007
- Ming-Chuan Hung, Man-Lin Huang, Don-Lin Yang, Nien-Lin Hsueh:
Efficient approaches for materialized views selection in a data warehouse.
1333-1348
- Bo Xie, Peng Han, Fan Yang, Ruimin Shen, Hua-Jun Zeng, Zheng Chen:
DCFLA: A distributed collaborative-filtering neighbor-locating algorithm.
1349-1363
- Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange.
1364-1375
- Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur:
A novel deniable authentication protocol using generalized ElGamal signature scheme.
1376-1381
- Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures.
1382-1394
- Shu Li, John E. Taplin, Yuching Zhang:
The equate-to-differentiate's way of seeing the prisoner's dilemma.
1395-1412
- Hongxuan Lei, Yongming Li:
Minimization of states in automata theory based on finite lattice-ordered monoids.
1413-1421
- Young Bae Jun, Yang Xu, Jun Ma:
Redefined fuzzy implicative filters.
1422-1429
- Adrian Ban, Ioan Fechete:
Componentwise decomposition of some lattice-valued fuzzy integrals.
1430-1440
- Rosario Toscano:
Robust synthesis of a PID controller by uncertain multimodel approach.
1441-1451
- Abbas Parchami, Mashaallah Mashinchi:
Fuzzy estimation for process capability indices.
1452-1462
- Murat Gülbay, Cengiz Kahraman:
An alternative approach to fuzzy control charts: Direct fuzzy approach.
1463-1480
- Antonio di Nola, Ciro Russo:
Lukasiewicz transform and its application to compression and reconstruction of digital images.
1481-1498
- William Zhu:
Topological approaches to covering rough sets.
1499-1508
- Huai-Ning Wu, Kai-Yuan Cai:
Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations.
1509-1522
- Ismail H. Toroslu, Göktürk Üçoluk:
Incremental assignment problem.
1523-1529
Volume 177,
Number 7,
April 2007
Fuzzy set applications in industrial engineering
- Cengiz Kahraman:
Fuzzy set applications in industrial engineering.
1531-1532
- Luis Martínez, Jun Liu, Da Ruan, Jian-Bo Yang:
Dealing with heterogeneous information in engineering evaluation processes.
1533-1542
- Patricia Melin, Oscar Castillo:
An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory.
1543-1557
- Guoqing Chen, Ming Ren, Peng Yan, Xunhua Guo:
Enriching the ER model based on discovered association rules.
1558-1566
- Cengiz Kahraman, Gülçin Büyüközkan, Nüfer Yasin Ates:
A two phase multi-attribute decision-making approach for new product introduction.
1567-1582
- Chongfu Huang, Hiroshi Inoue:
Soft risk maps of natural disasters and their applications to decision-making.
1583-1592
Regular papers
- Anthony J. T. Lee, Ruey-Wen Hong, Wei-Min Ko, Wen-Kwang Tsao, Hsiu-Hui Lin:
Mining spatial association rules in image databases.
1593-1608
- Chang-Tien Lu, Yufeng Kou, Jiang Zhao, Li Chen:
Detecting and tracking regional outliers in meteorological data.
1609-1632
- Tofigh Allahviranloo, N. Ahmady, E. Ahmady:
Numerical solution of fuzzy differential equations by predictor-corrector method.
1633-1647
- Barnabás Bede, Imre J. Rudas, Attila L. Bencsik:
First order linear fuzzy differential equations under generalized differentiability.
1648-1662
- Bin Liu, Xinzhi Liu, Kok Lay Teo:
Feedback stabilization of dissipative impulsive dynamical systems.
1663-1672
- Yi-Chung Hu:
Fuzzy integral-based perceptron for two-class pattern classification problems.
1673-1686
- Cristina Alcalde, Ana Burusco, Ramón Fuentes-González:
Ambiguity and fuzziness measures defined on the set of closed intervals in [0, 1].
1687-1698
- Wudhichai Assawinchaichote, Sing Kiong Nguang, Peng Shi:
Robust Hinfinity fuzzy filter design for uncertain nonlinear singularly perturbed systems with Markovian jumps: An LMI approach.
1699-1714
- Violeta Tomasevic, Slobodan Bojanic, Octavio Nieto-Taladriz:
Finding an internal state of RC4 stream cipher.
1715-1727
Volume 177,
Number 8,
April 2007
- Pasquale De Meo, Alfredo Garro, Giorgio Terracina, Domenico Ursino:
Personalizing learning programs with X-Learn, an XML-based, "user-device" adaptive multi-agent system.
1729-1770
- Xiaofan Yang, Yuan Yan Tang:
A (4n.
1771-1781
- Qiang Zhu, Jun-Ming Xu, Xinmin Hou, Min Xu:
On reliability of the folded hypercubes.
1782-1788
- Vasilios Katos, Bernard S. Doherty:
Exploring confusion in product ciphers through regression analysis.
1789-1795
- Chin-Chen Chang, Chih-Yang Lin:
Reversible steganographic method using SMVQ approach based on declustering.
1796-1805
- Habib M. Ammari:
Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture.
1806-1833
- Cheng-Kang Chu, Wen-Guey Tzeng:
Optimal resilient threshold GQ signatures.
1834-1851
- S. Dhompongsa, A. Kaewkhao, S. Saejung:
On topological properties of the Choquet weak convergence of capacity functionals of random sets.
1852-1859
- Glad Deschrijver, Etienne E. Kerre:
On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision.
1860-1866
- Ying-Ming Wang, Celik Parkan:
A preemptive goal programming method for aggregating OWA operator weights in group decision making.
1867-1877
- Wai-Tak Wong, Frank Y. Shih, Jung Liu:
Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps.
1878-1891
- Ranjit Kumar Barai, Kenzo Nonami:
Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot.
1892-1915
- Erzsébet Németh, Rozália Lakner, Katalin M. Hangos, Ian T. Cameron:
Prediction-based diagnosis and loss prevention using qualitative multi-scale models.
1916-1930
Volume 177,
Number 9,
May 2007
- Yon Dohn Chung, Ji Yeon Lee:
An indexing method for wireless broadcast XML data.
1931-1953
- Emilios Cambouropoulos, Maxime Crochemore, Costas S. Iliopoulos, Manal Mohamed, Marie-France Sagot:
All maximal-pairs in step-leap representation of melodic sequence.
1954-1962
- Markku Siermala, Martti Juhola, Jorma Laurikkala, Kati Iltanen, Erna Kentala, Ilmari Pyykkö:
Evaluation and classification of otoneurological data with new data analysis methods based on machine learning.
1963-1976
- Nguyen Van Hop:
Solving fuzzy (stochastic) linear programming problems using superiority and inferiority measures.
1977-1991
- Jihad Mohamad Jaam:
A new construction technique of a triangle-free 3-colored K16's.
1992-1995
Volume 177,
Number 10,
May 2007
Including Special Issue on Hybrid Intelligent Systems
- Oscar Castillo, Patricia Melin:
Special Issue on Hybrid Intelligent Systems.
1997-1998
- Edgar N. Sanchez, Hector M. Becerra, Carlos M. Velez:
Combining fuzzy, PID and regulation control for an autonomous mini-helicopter.
1999-2022
- Roberto Sepúlveda, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz, Oscar Montiel:
Experimental study of intelligent controllers under uncertainty using type-1 and type-2 fuzzy logic.
2023-2048
- Clodoaldo Ap. M. Lima, André L. V. Coelho, Fernando J. Von Zuben:
Hybridizing mixtures of experts with support vector machines: Investigation into nonlinear dynamic systems identification.
2049-2074
- Oscar Montiel, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz, Roberto Sepúlveda:
Human evolutionary model: A new approach to optimization.
2075-2098
Regular Papers
- Leonid I. Perlovsky:
Cognitive high level information fusion.
2099-2118
- Ning Zhang, Zhixiong Chen, Guozhen Xiao:
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis.
2119-2129
- Kuo-Liang Chung, Yi-Luen Huang, Yau-Wen Liu:
Efficient algorithms for coding Hilbert curve of arbitrary-sized image and application to window query.
2130-2151
- Guoli Ding, Jianhua Chen, Robert F. Lax, Peter P. Chen:
Graph-theoretic method for merging security system specifications.
2152-2166
- Irena Koprinska, Josiah Poon, James Clark, Jason Chan:
Learning to classify e-mail.
2167-2187
- Qingchun Ren, Qilian Liang:
Energy and quality aware query processing in wireless sensor database systems.
2188-2205
Volume 177,
Number 11,
June 2007
- Antonio Corral, Jesús Manuel Almendros-Jiménez:
A performance comparison of distance-based query algorithms using R-trees in spatial databases.
2207-2237
- Shi-Ming Huang, Tung-Hsiang Chou, Jia-Lang Seng:
Data warehouse enhancement: A semantic cube model approach.
2238-2254
- Guoren Wang, Xiangmin Zhou, Bin Wang, Baiyou Qiao, Donghong Han:
A hyperplane based indexing technique for high-dimensional data.
2255-2268
- Przemyslaw Kazienko, Michal Adamski:
AdROSA - Adaptive personalization of web advertising.
2269-2295
- Mansoor J. Zolghadri, Eghbal G. Mansoori:
Weighting fuzzy classification rules using receiver operating characteristics (ROC) analysis.
2296-2307
- Tingquan Deng, Yanmei Chen, Wenli Xu, Qionghai Dai:
A novel approach to fuzzy rough sets based on a fuzzy covering.
2308-2326
- Robert Bennes, Shahram Latifi, Naoto Kimura:
A comparative study of job allocation and migration in the pancake network.
2327-2335
- Victor Balopoulos, Anestis G. Hatzimichailidis, Basil K. Papadopoulos:
Distance and similarity measures for fuzzy operators.
2336-2348
- Ferdinando Di Martino, Salvatore Sessa:
Compression and decompression of images with discrete fuzzy transforms.
2349-2362
- Zeshui Xu:
Intuitionistic preference relations and their application in group decision making.
2363-2379
- Enrique Alba, J. Francisco Chicano:
Software project management with GAs.
2380-2401
Volume 177,
Number 12,
June 2007
Special Issue on Graph Theory and its Applications
- William Chung-Kung Yen, Paul P. Wang:
Guest editorial special issue on graph theory and its applications.
2403-2404
- Yin-Te Tsai, Yaw-Ling Lin, Fang-Rong Hsu:
Efficient algorithms for the minimum connected domination on trapezoid graphs.
2405-2417
- Chu-Fu Wang, Rong-Hong Jan:
A factoring approach for the Steiner tree problem in undirected networks.
2418-2435
- Rung-Bin Lin, Shuyu Chen:
Conjugate conflict continuation graphs for multi-layer constrained via minimization.
2436-2447
- Chen-Tung Chen, Sue-Fen Huang:
Applying fuzzy method for measuring criticality in project network.
2448-2458
- Ugur Dogrusöz, Konstantinos G. Kakoulis, Brendan Madden, Ioannis G. Tollis:
On labeling in graph visualization.
2459-2472
- Chung-Hsien Hsu, Sheng-Lung Peng, Chong-Hui Shi:
Constructing a minimum height elimination tree of a tree in linear time.
2473-2479
- Anita Saha, Madhumangal Pal, Tapan Kumar Pal:
Selection of programme slots of television channels for giving advertisement: A graph theoretic approach.
2480-2492
Regular papers
- David Taniar, Hui Yee Khaw, Haorianto Cokrowijoyo Tjioe, Eric Pardede:
The use of Hints in SQL-Nested query optimization.
2493-2521
- Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan:
Multiuser-based shadow watermark extraction system.
2522-2532
- Chong-Yaw Wee, Paramesran Raveendran:
Measure of image sharpness using eigenvalues.
2533-2552
- N. Nalini, G. Raghavendra Rao:
Attacks of simple block ciphers via efficient heuristics.
2553-2569
- Francisco García, Manuel A. Serrano, José A. Cruz-Lemus, Francisco Ruiz, Mario Piattini:
Managing software process measurement: A metamodel-based approach.
2570-2586
- Samantha Jenkins, Steven R. Kirk:
Software architecture graphs as complex networks: A novel partitioning scheme to measure stability and evolution.
2587-2601
- Mostafa I. H. Abd-El-Barr, Salman A. Khan:
Design and analysis of a fault tolerant hybrid mobile scheme.
2602-2620
Volume 177,
Number 13,
July 2007
- Chih-Yung Chang, Chao-Tsun Chang, Tzung-Shi Chen, Hsu-Ruey Chang:
Hierarchical management protocol for constructing a QoS communication path in wireless Ad Hoc networks.
2621-2641
- Wan-De Weng, Che-Shih Yang, Rui-Chang Lin:
A channel equalizer using reduced decision feedback Chebyshev functional link artificial neural networks.
2642-2654
- Luis M. San-José-Revuelta:
A new adaptive genetic algorithm for fixed channel assignment.
2655-2678
- Toru Araki, Yosuke Kikuchi:
Hamiltonian laceability of bubble-sort graphs with edge faults.
2679-2691
- Salman A. Khan, Andries Petrus Engelbrecht:
A new fuzzy operator and its application to topology design of distributed local area networks.
2692-2711
- Xiang-Yun Wang, Wenhui Zhang, Yong-Chao Li, Kai-Yuan Cai:
A polynomial dynamic system approach to software design for attractivity requirement.
2712-2725
- Haci Aktas, Naim Çagman:
Soft sets and soft groups.
2726-2735
- Fotis N. Koumboulis, Robert E. King, Anna Stathaki:
Logic-based switching controllers - A stepwise safe switching approach.
2736-2755
- Shichao Zhang, Jilian Zhang, Chengqi Zhang:
EDUA: An efficient algorithm for dynamic database mining.
2756-2767
- Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai:
Reversible hiding in DCT-based compressed images.
2768-2786
- Wei-Guo Zhang, Ying-Luo Wang, Zhi-Ping Chen, Zan Kan Nie:
Possibilistic mean-variance models and efficient frontiers for portfolio selection problem.
2787-2801
- George A. Papakostas, Yiannis S. Boutalis, Dimitris A. Karras, Basil G. Mertzios:
A new class of Zernike moments for computer vision applications.
2802-2819
Volume 177,
Number 14,
July 2007
- Xiaodi Huang, Wei Lai, A. S. M. Sajeev, Junbin Gao:
A new algorithm for removing node overlapping in graph visualization.
2821-2844
- Masakazu Takahashi, Kazutoshi Hanzawa, Takashi Kawasaki:
An efficient method for developing requirement specifications for plant control software using a component-based software prototype.
2845-2866
- Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh:
An efficient non-contiguous processor allocation strategy for 2D mesh connected multicomputers.
2867-2883
- Pedro A. Castillo Valdivieso, Juan Julián Merelo Guervós, Maribel García Arenas, Gustavo Romero:
Comparing evolutionary hybrid systems for design and optimization of multilayer perceptron structure along training parameters.
2884-2905
- Glad Deschrijver:
Arithmetic operators in interval-valued fuzzy set theory.
2906-2924
- Susana Díaz, Pedro Gil, Jorge Jiménez, Susana Montes:
Compatibility of t-norms with the concept of epsilon-partition.
2925-2944
- Yao Ouyang, Jinxuan Fang, Guiling Li:
On the convex combination of TD and continuous triangular norms.
2945-2953
- Yun Shi, Da Ruan, Etienne E. Kerre:
On the characterizations of fuzzy implications satisfying I(x, y)=I(x, I(x, y)).
2954-2970
- Nguyen Van Hop:
Solving linear programming problems under fuzziness and randomness environment using attainment values.
2971-2984
- Pei Yee Ho, Kazuyuki Shimizu:
Evolutionary constrained optimization using an addition of ranking method and a percentage-based tolerance value adjustment scheme.
2985-3004
- Dan Huang, Sing Kiong Nguang:
Static output feedback controller design for fuzzy systems: An ILMI approach.
3005-3015
Volume 177,
Number 15,
August 2007
- Manolis G. Vozalis, Konstantinos G. Margaritis:
Using SVD and demographic data for the enhancement of generalized Collaborative Filtering.
3017-3037
- Li Chunlin, Li Layuan:
Joint QoS optimization for layered computational grid.
3038-3059
- Vasilios Katos:
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis.
3060-3073
- Sung Jin Yoo, Jin Bae Park, Yoon Ho Choi:
Indirect adaptive control of nonlinear dynamic systems using self recurrent wavelet neural networks via adaptive learning rates.
3074-3098
- Xiaoxia Li, Jianjun Wang:
A steganographic method based upon JPEG and particle swarm optimization algorithm.
3099-3109
- Ling Tan, David Taniar:
Adaptive estimated maximum-entropy distribution model.
3110-3128
- Danhyung Lee, Kwang Chun Lee, Sungwon Kang, Jongmoon Baik:
A priori ordering protocols to support consensus-building in multiple stakeholder contexts.
3129-3150
- Jianxi Fan, Xiaohua Jia:
Embedding meshes into crossed cubes.
3151-3160
- Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, Hung-Chang Chen:
A location-aware multicasting protocol for Bluetooth Location Networks.
3161-3177
- Ling Wei, Hong-Ru Li, Wen-Xiu Zhang:
Knowledge reduction based on the equivalence relations defined on attribute set and its power set.
3178-3185
- Radim Belohlávek:
A note on variable threshold concept lattices: Threshold-based operators are reducible to classical concept-forming operators.
3186-3191
- Heriberto Román-Flores, A. Flores-Franulic, Yurilev Chalco-Cano:
A Jensen type inequality for fuzzy integrals.
3192-3201
- Gh. Khaledi, S. A. Ziaie, Mashaallah Mashinchi:
Lattice structure of e-implications on L*.
3202-3214
Volume 177,
Number 16,
August 2007
Mathematical Foundation for Intelligent Technologies (InTech03),
Selected papers presented at the Mathematical Foundation sessions of the 4th International Conference on Intelligent Technologies InTech'03
Regular papers
- T. Bag, S. K. Samanta:
Some fixed point theorems in fuzzy normed linear spaces.
3271-3289
- Salih Aytar, Serpil Pehlivan:
Statistical cluster and extreme limit points of sequences of fuzzy numbers.
3290-3296
- A. Nihal Tuncer, F. Berna Benli:
lambda-Statistical limit points of the sequences of fuzzy numbers.
3297-3304
- M. Bakhshi, Rajab Ali Borzooei:
Lattice structure on fuzzy congruence relations of a hypergroupoid.
3305-3313
- Sang-Eon Han:
Digital fundamental group and Euler characteristic of a connected sum of digital closed surfaces.
3314-3326
- John D. Angelopoulos, C. Dessauvage, Helen-Catherine Leligou, Konstantinos Kanonakis, C. Matrakidis, E. Six:
Dynamic address resolution for enhanced configurability in packet-based TDMA GPONs.
3327-3340
- DaeEun Kim, Jaehong Park:
Application of adaptive control to the fluctuation of engine speed at idle.
3341-3355
- Ying-Ming Wang, Ying Luo, Zhongsheng Hua:
Aggregating preference rankings using OWA operator weights.
3356-3363
- Ihsan Yüksel, Metin Dagdeviren:
Using the analytic network process (ANP) in a SWOT analysis - A case study for a textile firm.
3364-3382
- Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lung Lin:
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes.
3383-3396
- Mahmoud A. Abo-Sinna, Ibrahim A. Baky:
Interactive balance space approach for solving multi-level multi-objective programming problems.
3397-3410
Volume 177,
Number 17,
September 2007
- Michael D. Morse, Jignesh M. Patel, William I. Grosky:
Efficient continuous skyline computation.
3411-3437
- Peyman Kouchakpour, Anthony Zaknich, Thomas Bräunl:
Population variation in genetic programming.
3438-3452
- Anthony J. T. Lee, Chun-sheng Wang:
An efficient algorithm for mining frequent inter-transaction patterns.
3453-3476
- Unil Yun:
Efficient mining of weighted interesting patterns with a strong weight and/or support affinity.
3477-3499
- Degang Chen, Changzhong Wang, Qinghua Hu:
A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets.
3500-3518
- Jun-Ki Min, Myung-Jae Park, Chin-Wan Chung:
XTREAM: An efficient multi-query evaluation on streaming XML data.
3519-3538
- Gen Ming Guo:
A computer-aided bibliometric system to generate core article ranked lists in interdisciplinary subjects.
3539-3556
- Yiqiu Han, Wai Lam, Charles X. Ling:
Customized classification learning based on query projections.
3557-3573
- Donghua Yang, Jianzhong Li:
Distributed multi-join query processing in data grids.
3574-3591
- Shahar Cohen, Lior Rokach, Oded Maimon:
Decision-tree instance-space decomposition with grouped gain-ratio.
3592-3612
- Baoliu Ye, Minyi Guo, Daoxu Chen, Sanglu Lu:
A degree-constrained QoS-aware routing algorithm for application layer multicast.
3613-3626